summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2006-6056
blob: 5755c5c4c720906beccb87e1d4bf57b59db422b6 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
Candidate: CVE-2006-6056
References: 
 http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d6ddf55440833fd9404138026af246c51ebeef22
 MISC:http://projects.info-pull.com/mokb/MOKB-14-11-2006.html
Description: 
 Linux kernel 2.6.x up to 2.6.18 and possibly other versions, when SELinux
 hooks are enabled, allows local users to cause a denial of service (crash)
 via a malformed file stream that triggers a NULL pointer dereference in the
 superblock_doinit function, as demonstrated using an HFS filesystem image.
Ubuntu-Description: 
 The hfs file system driver did not properly handle corrupted data
 structures. By mounting a specially crafted hfs file system, a local
 attacker could exploit this to crash the kernel. This only affects
 systems which enable SELinux (Ubuntu disables SELinux by default).
Notes: 
 dannf> Though this bug fix applies to 2.4, 2.4 does not include SELinux
        so it should not be vulnerable to the DoS
Bugs: 
upstream: released (2.6.19)
linux-2.6: released (2.6.18.dfsg.1-10)
2.6.18-etch-security: released (2.6.18.dfsg.1-10) [bugfix/2.6.16.38]
2.6.8-sarge-security: released (2.6.8-16sarge7) [hfs-no-root-inode.dpatch]
2.4.27-sarge-security: N/A
2.6.12-breezy-security: released (2.6.12-10.43)
2.6.15-dapper-security: released (2.6.15-28.51)
2.6.17-edgy-security: released (2.6.17.1-11.35)

© 2014-2024 Faster IT GmbH | imprint | privacy policy